Role engineering secures information systems and ensures that every user has the right permission to access just the right information, computers, or networks. This first-of-its-kind book illustrates the entire process, from project planning to deployment and verification.
Read More
Role engineering secures information systems and ensures that every user has the right permission to access just the right information, computers, or networks. This first-of-its-kind book illustrates the entire process, from project planning to deployment and verification.
Read Less